Answer: 11.T 12.T 13.F 14.F 15.T Explanation: hope it's help Answer: 11)True 12)True 13)False 14)True 15)False Explanation: Sanamakatulong #CerryonLearning 2.Spam–unwanted email mostly from bots or advertisers. It can be used to send malware.3.Phishing– its goal is to acquire sensitive personal information like passwords and credit card details.This is done by sending you an email that will direct the user to visit a website and be asked to updatehis/her username, password, credit card, or personal information.*Pharming– a more complicated way of phishing where it exploits the DNS (Domain Name Service)system.Copyright InfringementIf you create something – an idea, an invention, a form of literary work, or aresearch, you have the right as to how it should be used by others. This is calledintellectual property.In other words, the copyright law includes your rights over your work, and anyone We’ve updated our privacy policy so that we are compliant with changing global privacy regulations and to provide you with insight into the limited ways in which we use your data. You can read the details below. By accepting, you agree to the updated privacy policy. Thank you! View updated privacy policy We've encountered a problem, please try again. 1. Malware Stands for Malicious Software a. Virus Type of Malware A malicious program designed to replicate itself and transfer from one computer to another either through the internet and local networks or data storage like flashdrives and CDs Type of Malware A malicious program that transfers from one computer to another by any type of means. Often, it uses computer network to spread itself. Example: the ILOVEYOU worm (Love Bug worm) Type of Malware A malicious program that is disguised as a useful program but once downloaded or installed, leaves your PC unprotected and allows hackers to get your information Under Trojan Tricks the user into posing that it is security software. It asks the user to pay improve his/her security but in reality, they are not protected at all. Type of Malware A program that runs in the background without you knowing it. It has the ability to monitor what you are currently doing and typing through keylogging Used to record the keystroke done by the users This is done to steal their password or any other sensitive information. It can record email, messages, or any information you type using your keyboard. Type of Malware A program designed to send you advertisement, mostly as pop-ups An internet threat Unwanted email mostly from bots or advertisers. It can be used to send malware. Its goal is to acquire sensitive information like passwords and credit card details. This is done by sending you an email that will direct the users to visit a website and be asked to update his/her username, password, credit card, or personal information. A more complicated way of phishing where it exploits the DNS (Domain Name Service) system 1. Before you post something on the web ask these questions to yourself: would you want your parents or grandparents to see it? Would you want your future boss to see it? 1. Understand Tips that could help you avoid copyright infringement Tip to avoid copyright infringement Copyright protects literary works, photographs, paintings, drawings, etc.. Tip to avoid copyright infringement Even if a material does not say that it is copyrighted, it is not a valid defense against copyright. Tip to avoid copyright infringement Ask yourself whether what you are making is something that came from you or something made from somebody else's creativity. It is important to add your own creative genius in everything that will be credited to you. Tip to avoid copyright infringement There are some limitations to copyright laws. The information that we need is more likely already in the internet. It is just a matter of how to look for it and how to use information from the most credible source. 1. Have a question in mind Tips in conducting research online Advance Search Symbol Finds web pages that contain all the terms that are preceded by the symbol; allows you to include terms that are usually ignored Advance search symbol Finds the exact words in a phrase Advance search symbol Finds or excludes web pages that contain a group of words Advance search symbol Finds web pages that contain all the terms of phrases Advance search symbol Excludes webpages that contain a term or phrase Advance search symbol Finds web pages that contain either of the terms of phrases What kind of program has the ability to monitor what you are doing and typing through keylogging?Spyware is a type of program that is installed with or without your permission on your personal computers to collect information about users, their computer or browsing habits tracks each and everything that you do without your knowledge and send it to remote user.
What do you call the ability of spyware to monitor what you are currently doing and typing?Spyware. A program that runs in the background without you knowing it. It has the ability to monitor what you are currently doing and typing through keylogging.
What is Trojan in empowerment technology?Trojan A malicious program disguised as a useful program but once downloaded or installed, leaves your PC unprotected & allows hackers to get information.
What is spyware in cyber security?Spyware is any software that installs itself on your computer and starts covertly monitoring your online behavior without your knowledge or permission. Spyware is a kind of malware that secretly gathers information about a person or organization and relays this data to other parties.
|